This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.The same code executed in a Qemu environment does not raise any exception. ... A general-protection exception is generated if the limit on instruction length is violated. ... move operation, the CPU raises an illegal instruction exception.
|Author||:||Juan Garay, Arjen K. Lenstra, Masahiro Mambo|
|Publisher||:||Springer Science & Business Media - 2007-09-20|